• Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

Hackers Use ‘Ghost Calls’ to Abuse Web Conferencing Platforms for Covert C2

Jane Doe by Jane Doe
August 7, 2025
in Cyber
Hackers Use ‘Ghost Calls’ to Abuse Web Conferencing Platforms for Covert C2
Share on FacebookShare on Twitter

Cybersecurity researchers have uncovered a new and highly stealthy technique being used by threat actors, dubbed “ghost calls,” to establish covert command-and-control (C2) communication channels. These attacks exploit the underlying architecture of popular web conferencing platforms, turning legitimate communication tools into an undetectable backdoor for malicious activity. This development poses a significant challenge for network defenders, as the malicious traffic blends in seamlessly with everyday business operations.

The Mechanism of the Attack

The term “ghost call” refers to a type of phantom, silent phone call that occurs without a human on the other end. In this new cyberattack method, hackers leverage the same concept to create a persistent and encrypted channel between a compromised machine and an attacker-controlled server. The attack works by hijacking a victim’s web conferencing client, such as Zoom, Microsoft Teams, or Webex, after an initial compromise. Instead of using traditional C2 methods that might be flagged by security tools, the malware initiates a “call” or a peer-to-peer connection to a seemingly legitimate endpoint.

The cleverness of this technique lies in its ability to tunnel malicious traffic through the web conferencing platform’s infrastructure. These platforms, to function in diverse network environments, often use protocols like WebRTC and TURN (Traversal Using Relays around NAT). Attackers exploit these protocols to relay their C2 traffic through the conferencing service’s own servers, making it appear as regular, encrypted video or audio data. Because this traffic originates from a trusted application and communicates with a trusted domain, it effortlessly bypasses most firewalls and network monitoring systems.

Read

App Store Power and Censorship: How Apple and Google Shape Your Digital Future

Google Sets Sights on Defying Gravity with Antigravity Project

Evasion and Impact

For network defenders, this is a nightmare. Traditional security tools are designed to detect suspicious connections to known malicious IP addresses or unusual traffic patterns. However, ghost call C2 traffic is indistinguishable from a standard video meeting. It uses the same ports, the same protocols, and connects to the same legitimate cloud-hosted servers that employees use every day. This makes it incredibly difficult to detect, as it simply looks like a user is in a long, silent meeting.

Once established, this covert channel allows the attacker to maintain a persistent foothold on the network. They can use the C2 channel for various nefarious purposes, including:

  • Data exfiltration: Secretly siphoning sensitive information from the compromised machine.
  • Lateral movement: Using the compromised device as a pivot to access other systems on the network.
  • Dropping additional malware: Deploying more potent tools, such as ransomware or keyloggers, without being detected.

Mitigation Strategies

Organizations must rethink their security posture to combat this novel threat. A simple firewall or intrusion detection system won’t cut it. Experts suggest that a multi-layered approach is required, focusing on a deeper level of analysis and endpoint security.

  • Enhanced Endpoint Detection and Response (EDR): EDR solutions are crucial for monitoring an endpoint’s behavior. They can identify unusual processes or data flows from a web conferencing application that don’t align with a user’s typical activities.
  • Application Control and Whitelisting: Limiting the applications that can generate network traffic and restricting their behaviors can help contain a potential breach.
  • Network Traffic Analysis: Employing advanced tools that can analyze the content of encrypted traffic, a process known as deep packet inspection, may help identify subtle anomalies that indicate a ghost call.
  • User Training: Educating employees about the risks and how to spot potential signs of compromise, such as slow-performing applications, can be an important first line of defense.

As hackers continue to innovate and find new ways to bypass security measures, the cybersecurity community must adapt just as quickly. The “ghost call” method is a stark reminder that even the most trusted tools can be weaponized in the hands of a determined adversary.

Previous Post

New call for concept notes on the socio-economic impacts of AI in Africa launched

Next Post

CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers

Jane Doe

Jane Doe

More Articles

Operation WrtHug Hijacks Tens of Thousands ASUS Routers
Latest News

Operation WrtHug Hijacks Tens of Thousands ASUS Routers

Massive Infection: Tens of thousands of end-of-life ASUS WRT routers compromised worldwide, mainly in Taiwan, the US, and Russia. Exploit...

by Sumit Chauhan
November 19, 2025
WhatsApp Worm Delivers Brazilian Banking Trojan
Cyber

WhatsApp Worm Delivers Brazilian Banking Trojan

Worm Spread: Python-scripted WhatsApp worm targets Brazil, hijacking accounts to send a Delphi-based banking trojan, Eternidade Stealer. Infection Path: Starts...

by Sumit Chauhan
November 19, 2025
FBI Sounds Alarm on Akira Ransomware’s 0 Million Haul
Cyber

FBI Sounds Alarm on Akira Ransomware’s $250 Million Haul

Ransom Total: $248.9 million from 321 victims—mostly US firms in tech, finance, healthcare since May 2023. Tactics: Double extortion—encrypts files,...

by Max Mueller
November 16, 2025
US Car Dealers Grind to Halt in CDK Ransomware Chaos
Cyber

US Car Dealers Grind to Halt in CDK Ransomware Chaos

Scale Hit: 15,000+ dealerships across US and Canada offline—sales, financing, service apps down for weeks. Financial Sting: $1.2 billion lost...

by Mayank Singh
November 16, 2025
Next Post
CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers

CISA Warns of 'ToolShell' Exploits Chain Attacks SharePoint Servers

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest News

China Accuses US of Cyberattacks Using Microsoft Email Server Flaws

China Accuses US of Cyberattacks Using Microsoft Email Server Flaws

August 1, 2025
Online Scam Cases Continue to Rise Despite Crackdowns on Foreign Fraud Networks [Myanmar]

Online Scam Cases Continue to Rise Despite Crackdowns on Foreign Fraud Networks [Myanmar]

June 30, 2025
Stay Safe from Ransomware Using Skitnet Malware Techniques

Stay Safe from Ransomware Using Skitnet Malware Techniques

May 20, 2025
MMaDA-Parallel: Advanced Multimodal Model Revolutionizing Content Generation

MMaDA-Parallel: Advanced Multimodal Model Revolutionizing Content Generation

November 19, 2025
Anthropic Blocks AI Misuse for Cyberattacks

Anthropic Blocks AI Misuse for Cyberattacks

August 28, 2025
New VoIP Botnet Targets Routers Using Default Passwords

New VoIP Botnet Targets Routers Using Default Passwords

July 25, 2025
Aflac Incorporated Discloses Cybersecurity Incident

Aflac Incorporated Discloses Cybersecurity Incident

June 20, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.